The article names Verint Systems Inc, based in New York, as exporting competing equipment for the $3 billion “Lawful Intercept” market worldwide.
U.S. and EU export laws and UN sanctions control just a narrow slice of technology such as weapons systems or data encryption. International embargoes that cover a broader range of equipment target only a small circle of the worst actors, such as Myanmar and North Korea.
As somebody who had to puzzle this out on his own … you are gonna find this article so helpful.
During my development with Twitter4j, I was stuck with the authentication process. This article is an attempt at easing the use of Twitter4j so that I’ll be the only one to face such problems.
Coming your way Sept 15 … re-write and re-test while there is still time. Reminds me of when Twitter switched authentication to Oauth.
Google already uses SSL with several of its applications including Gmail and Google Docs, but now the firm has turned its attention to developer APIs. The firm will require all users of its Documents List, Spreadsheet and Sites APIs to use SSL after 15 September.
This is the future of Java on Mac. Learn to love it.
The OpenJDK project has released the first code for the Apple-backed open source version of Java Development Kit 7 for Mac OS X.
The initial code – a BSD port – is now available from the new Mac OS X Port Project on the OpenJDK website. The project already offers a mailing list and project wiki, and a bug reporter in on the way. The latest developments are available from the project status page.
For those of you designing web sites, look to these demos for some inspiration.
Have a look at the diagram. Something to keep in mind if you need to serve up high performance Java applications on a budget.
As you can see, when a client do a request to the nginx server, it first checks on memcached if the response is already cached. If the response was not found on cache server, then nginx forward the request to Tomcat, which process the request, cache the response on memcached and returns it to nginx. Tomcat works only for the first client, and all other clients requesting the same resource will get the cached response on RAM. My objective with this post is to show how we built this architecture.
Yes, you can see this posted on Slashdot, too. But since we blogged the original analysis that Stuxnet looked like a piece of ordinance consider this a follow up. The story reads like the Pink Panther scene where Clouseau has gathered all the suspects together in the drawing room and methodically ticks off the facts that lead to the undeniable conclusion that the wrong person did it. If you got China and Israel into a drawing room and confronted them with these facts … read on:
As far as China goes, I’ve identified 5 distinct ties to Stuxnet that are unique to China as well as provided a rationale for the attack which fits China’s unique role as Iran’s ally and customer, while opposing Iran’s fuel enrichment plans.
With Oracle poised to go Freemium on Java, directories of JVM alternatives are getting plentiful. But this one included some useful (if niche) alternatives. In addition to
all the usual suspects” there is a Java-to-C version, and a Mono/.Net compatible version listed near the end.
JC Virtual machine converts Java class files to C source code. It could also compiles with GCC and loads them with built-in ELF loader. Additional to that, JC provides a complete Java runtime with optimization to increase performance.